[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Sawada et al., 2015 - Google Patents

A fallback control study of networked control systems for cybersecurity

Sawada et al., 2015

Document ID
15539419501954315510
Author
Sawada K
Sasaki T
Shin S
Hosokawa S
Publication year
Publication venue
2015 10th Asian Control Conference (ASCC)

External Links

Snippet

Recent control systems of critical infrastructures are networked systems, which are exposed to the infection of the computer malwares. This paper considers a cybersecurity technology of networked control systems in terms of availability. Architecture of fallback control is …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance

Similar Documents

Publication Publication Date Title
Zografopoulos et al. Cyber-physical energy systems security: Threat modeling, risk assessment, resources, metrics, and case studies
Tuyen et al. A comprehensive review of cybersecurity in inverter-based smart power system amid the boom of renewable energy
Venkataramanan et al. Measuring and enhancing microgrid resiliency against cyber threats
Liu et al. Enhancing cyber-resiliency of der-based smart grid: A survey
Ding et al. A survey on security control and attack detection for industrial cyber-physical systems
Wang et al. Distributed framework for detecting PMU data manipulation attacks with deep autoencoders
Lin et al. Runtime semantic security analysis to detect and mitigate control-related attacks in power grids
Adhikari et al. Applying hoeffding adaptive trees for real-time cyber-power event and intrusion classification
Lou et al. Assessing and mitigating impact of time delay attack: Case studies for power grid controls
Kundur et al. Towards modelling the impact of cyber attacks on a smart grid
Parthasarathy et al. Bloom filter based intrusion detection for smart grid SCADA
Mousavian et al. Real-time data reassurance in electrical power systems based on artificial neural networks
Anwar et al. Ensuring data integrity of OPF module and energy database by detecting changes in power flow patterns in smart grids
Tadepalli et al. Distributed control microgrids: Cyber-attack models, impacts and remedial strategies
Ni et al. Concept and research framework for coordinated situation awareness and active defense of cyber-physical power systems against cyber-attacks
Sawada et al. A fallback control study of networked control systems for cybersecurity
Lydia et al. Securing the cyber-physical system: A review
Patel et al. Event‐triggered detection of cyberattacks on load frequency control
He et al. Cascading failure in cyber–physical systems: A review on failure modeling and vulnerability analysis
Sadi et al. Time sequence machine learning-based data intrusion detection for smart voltage source converter-enabled power grid
Madabhushi et al. A survey of anomaly detection methods for power grids
Hossain-McKenzie et al. Harmonized automatic relay mitigation of nefarious intentional events (harmonie)-special protection scheme (sps)
Huang et al. Algorithmic attack synthesis using hybrid dynamics of power grid critical infrastructures
Sasaki et al. Fallback and recovery control system of industrial control system for cybersecurity
Sun et al. A reinforcement learning engine with reduced action and state space for scalable cyber-physical optimal response